Research Paper on "Data Center Design"
Research Paper 4 pages (1201 words) Sources: 4
[EXCERPT] . . . .
company is a reputable organization that offers payroll services to 600 businesses across the United States, and our clients are connected to our Data Center via dedicated circuits. Based on the nature of our business, we are required to deliver a secured data transmission and security boundary to our payroll system within our data center and to the router of each client's network system.Objective of this paper is to design various techniques to develop a high level Data Center that would consist of security architecture baseline. Information system security is a measure to reduce various threats susceptible to the network and information devices. The network and information security systems that our company intends to design are to protect electronic information transmitted across the network. Thus, the report designs high-level security devices to protect to our architectural systems.
High Level Security Devices
The layout of our Data Center architecture consists of four server farms, which include:
Mail Server Farm
Web Server Farm
Application Server Farm, and Database Server Farm.
The servers require high-level security to protect our sensitive information and client's information. Our organization will employ the following security devises to protect our Data Center:
Firewall
IDS (Intrusion Detection System)
IPS (Intrusion Prevention System )
Firewall is one of the security mechanisms to protect an organizational network. "Firewall is a gateway that enforces a boundar
download full paper ⤓
Our company will take the advantages of firewall security platform to protect our Application Server, Web Server Farm, Mail Farm and Database Server Farm. To enhance effective security protocol of our network resources, our company also integrates intrusion detection system. Our firewall will assist us to filter the traffic, and "filter or block traffic based on properties of the data communications stream including Traffic Control Protocol (TCP) state, source and destination, conformance with authorized communications protocols, data types embedded within the data communications stream, and contents of the data communications stream. For example, filters may be used to block traffic to or from prohibited IP or MAC addresses or TCP ports." (Communication Security 2007 P. 12).
Intrusion Detection System
Detection control is the second line of security defense for our architectural system. Detection control is critical to our security system to detect whether the security incidents have actually occurs in our information systems.
Prevention control is also very critical for the enhancement of security system. The prevention control such as IPS is an effective tool to prevent an unauthorized access to the company architectural devises. The IPS is used to prevent unauthorized access to it to enhance confidentiality, availability and integrity of the data within the company's information systems.
As being revealed in our company architectural diagram, our company will be connected to the internet that would assist in transmitting and receiving data across the network system. To protect out our system from the negative impact of the internet traffic, the IDS will be installed near the internet network to detect unauthorized network incident. Moreover, the firewall will be used to protect the Mail Server Farm and Web Server Farm. The second… READ MORE
Quoted Instructions for "Data Center Design" Assignment:
Data Center Design Paper
Please write four-page research paper using attached diagram and following information:
Your company is a shared service provider that provides payroll services to 600 small businesses. Your clients are connected to your Data Center via dedicated circuits. Your security boundary consists of delivering secure data transmissions to your payroll system within your Data Center and to the demarcation router of each client's network.
Task Description
Develop a high-level Data Center and security architecture baseline design that will show how your client's data will be transmitted, processed, and stored securely within the Data Center and while in route to and from your client's locations.
Minimum requirements consist of developing your high-level architecture design reflecting your circuits and the placement of your security devices (firewalls, Intrusion Detection Systems or IDSs), the protection tools you will have running to monitor your traffic, along with your encryption solution.
Include the following three sections in your Data Center Design Paper:
1. Architecture Design Drawing reflecting your circuits and the placement of your security devices (firewalls, IDSs).
2. The protection tools you will have running to monitor your traffic along with your encryption solution.
3. Identify the boundary of the Data Center and the representation of the client's boundary location.
Consider using following sources:
Data Center Operations Management. Cisco IT Best Practices.
Guide to computer forensics and investigations, chapter X.
Guide to industrial control systems (ICS). Security, NIST Special Publication, 800-82, chapter 3.
Guidelines for Smart Grid cyber security: Vol. 1, Smart Grid Cyber Security Strategy, Architecture, and High-Level Requirements (NISTIR 7628 Vol. 1), chapter 3.
How Cisco IT operates, manages, and protects its Data Center: A Cisco on Cisco case study.
Thank you.
*****
How to Reference "Data Center Design" Research Paper in a Bibliography
“Data Center Design.” A1-TermPaper.com, 2013, https://www.a1-termpaper.com/topics/essay/company-reputable-organization/6417307. Accessed 4 Oct 2024.
Related Research Papers:
Data Centers Research Paper
centre can be described as a "…computer system's most important and vulnerable component" (What is a Data Center?). In simple terms, a data center is a physical area which houses… read more
Research Paper 15 pages (5439 words) Sources: 15 Topic: Management / Organizations
Data Collection for the Motivation to Three Methodology Chapter
data collection for the motivation to three preschool criteria, which includes rewards, and no rewards motivation. The chapter also discusses the research design, and research procedures, sources of data, collection… read more
Methodology Chapter 6 pages (1869 words) Sources: 1+ Topic: Education / Teaching / Learning
Data Warehousing as the Senior Analyst Responsible Research Proposal
Data Warehousing
As the senior analyst responsible for data staging, you are responsible for the design of the data staging area. If your data warehouse gets input from several legacy… read more
Research Proposal 3 pages (983 words) Sources: 0 Topic: Computers / IT / Internet
Data Warehouse Implementation Research Proposal
Data Warehousing at Wal-Mart
The intent of this paper is to evaluate the data warehousing project Wal-Mart implemented in June, 2007 to streamline business analytics and reporting from its 4,000… read more
Research Proposal 3 pages (974 words) Sources: 2 Style: MLA Topic: Computers / IT / Internet
Data Mining Thesis
Data Mining
Evaluating Data Mining as a Strategic Technology
The ability to quickly gain insights from a diverse and often incompatibles set of databases and data sets are possible when… read more
Thesis 10 pages (3527 words) Sources: 8 Topic: Computers / IT / Internet
Fri, Oct 4, 2024
If you don't see the paper you need, we will write it for you!
We can write a new, 100% unique paper!